Answer Posted / krishna
6. To add to the above points we need to consider the SU24 changes as well.
7. Take all the required approvals from the respective stakeholders before moving the changes to Quality system for testing. To avoid any further changes.
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is the Functionality difference between ECC 5 and ECC6? i.e. new functionality in ECC6 which is not in ECC 5.
By which parameter number of entries are controlled in the user buffer?
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
What is the difference between authorization object and authorization object class?
Please let me know if there any vacancies for 3 years of Experienced level in SAP Security
when performing client copies what steps you need to take from CUA point of view?
What does the pfcg_time_dependency clean up?
Any details about secatt apart from SAPSecurity online.com?
what is hypercare and go live support?
Explain sap system transactions?
How we Provided SAP Security design, configuration, and support for SAP Net Weaver systems running BI/BW 7.0 (Net Weaver 2004s)
How to add custon t-code to a role and how to find the auth obj of custom t-code.if the custom t-code doesnt have auth obj, will you save and generate the role?
What authorization is required to create and maintain user master records?
what is the process to find that one consultant had removed a table from sap tables
What are su56 t-codes used for?